EP3346435A1 - Verfahren zur erzeugung einer virtuellen privaten gemeinschaft und netzwerk unter verwendung der virtuellen privaten gemeinschaft - Google Patents

Verfahren zur erzeugung einer virtuellen privaten gemeinschaft und netzwerk unter verwendung der virtuellen privaten gemeinschaft Download PDF

Info

Publication number
EP3346435A1
EP3346435A1 EP18152361.4A EP18152361A EP3346435A1 EP 3346435 A1 EP3346435 A1 EP 3346435A1 EP 18152361 A EP18152361 A EP 18152361A EP 3346435 A1 EP3346435 A1 EP 3346435A1
Authority
EP
European Patent Office
Prior art keywords
virtual private
community
private community
virtual
communication device
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
EP18152361.4A
Other languages
English (en)
French (fr)
Inventor
Jae Hoon Kim
Ki Ho Kim
Myeong Wuk Jang
Byoung Joon Lee
Mi Suk Huh
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Samsung Electronics Co Ltd
Original Assignee
Samsung Electronics Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Samsung Electronics Co Ltd filed Critical Samsung Electronics Co Ltd
Publication of EP3346435A1 publication Critical patent/EP3346435A1/de
Ceased legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/20Services signaling; Auxiliary data signalling, i.e. transmitting data via a non-traffic channel
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/20Services signaling; Auxiliary data signalling, i.e. transmitting data via a non-traffic channel
    • H04W4/21Services signaling; Auxiliary data signalling, i.e. transmitting data via a non-traffic channel for social networking applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates

Definitions

  • the following description relates to a method of generating a virtual private community and a network using the virtual private community.
  • An application and communication device may provide a social network service.
  • the social network service may provide a community type website that enables a user to add friends or personal connections, and also allows the user to share various information through the community type website.
  • a server is used and the users that use the social network service access the service through the server.
  • a method for generating a user-oriented virtual private community including generating a first virtual private community for a predetermined user comprising at least one communication device of the predetermined user.
  • the method may further comprise generating, as a higher level community in comparison to the first virtual private community, a second virtual private community including the first virtual private community as a member.
  • the second virtual private community may further include another first virtual private community corresponding to a user authorized by the predetermined user.
  • the first and second virtual private communities may each have a unique virtual community identifier.
  • the at least one communication device included in the first virtual private community may generate a hierarchical content name using the virtual community identifier of each of the first and second virtual private communities, and a content name included in the at least one communication device, and the hierarchical content name may comprise the virtual community identifier of each of the first and second virtual private communities, and the content name included in the at least one communication device.
  • the members of the second virtual private community may share a content sharing service or a social networking service.
  • the method may further comprise generating a third virtual private community including the second virtual private community and another second virtual private community as members.
  • the first virtual private community, the second virtual private community, and the third virtual private community may each have a unique virtual community identifier.
  • the at least one communication device included in the first virtual private community may generate a hierarchical content name using the virtual community identifier of each of the first virtual private community, the second virtual private community, and the third virtual private community, and a content name included in the at least one communication device, and the hierarchical content name may comprise the virtual community identifier of each of the first virtual private community, the second virtual private community, and the third virtual private community, and the content name included in the at least one communication device.
  • the at least one communication device may perform a self-secure association using a security key generated based on a public key.
  • a new communication device may join at least one of the first virtual private community, the second virtual private community, and the third virtual private community, and may perform association using the public key and the security key.
  • the method may further comprise generating, by the predetermined user, a fourth virtual private community that is hierarchically independent of the second virtual private communities and the third virtual private community.
  • the method may further comprise generating, by members of the fourth virtual private community, a public key for the fourth virtual private community, and generating, by the members of the fourth virtual private community, a security key for the fourth virtual private community, using the public key for the fourth virtual private community.
  • an operating method of a communication device communicating in a virtual private community including acquiring a virtual community identifier of the virtual private community from another communication device that is included in the virtual private community, and generating a hierarchical content name including a virtual community identifier of the virtual private community and a content name included in the communication device.
  • the method may further comprise generating a public key for the virtual private community, generating a security key of the virtual private community based on the public key, and performing a self-secure association with another communication device of the virtual private community using the security key.
  • the method may further comprise providing the public key or the security key to another communication device of another virtual private community that requests association with the communication device, and performing association with the other communication device of the other virtual private community using the public key or the security key.
  • an operation method of a communication device communicating in a network of virtual private communities wherein the virtual private communities comprise a first virtual private community and a second virtual private community including the first virtual private community as a member, the method including acquiring virtual community identifiers of the first and second virtual private communities, and processing a content request received from another communication device using the virtual community identifiers of the first and second virtual private communities.
  • the processing may comprise performing association with a communication device that has the content, using the virtual community identifiers of the first and second virtual private communities.
  • the processing may comprise generating a routing path between the communication device that has the content and another communication device that requests the content, using the virtual community identifiers of the first and second virtual private communities.
  • the method may further comprise transmitting, to members of the second virtual private community, a public key to recognize the communication device as a hub.
  • the method may further comprise detecting a change in contents included in members of the second virtual private community, and acquiring the changed contents from the members of the second virtual private community.
  • the method may further comprise performing, with members of the second virtual private community, one of a synchronization, a push, and a content search.
  • the method may further comprise managing information about members of the second virtual private community and information about contents included in the members of the second virtual private community.
  • the method may further comprise exchanging communication environment information with other virtual private communities that are outside of the second virtual private community, to perform communication with the other virtual private communities.
  • the communication environment information may comprise information about virtual community identifiers and contents included in members of the second and other virtual private communities.
  • a computer-readable storage medium having stored therein program instructions to cause a processor to implement a method for generating a user-oriented virtual private community, the method including generating a first virtual private community for a predetermined user comprising at least one communication device of the predetermined user.
  • a virtual private community network including at least one communication device to generate a hierarchical content name using a content name and a virtual community identifier of each of a first virtual private community and a second virtual private community including the first virtual private community as a member, and at least one hub to process a content request received from a communication device using the hierarchical content name.
  • a communication device communicating in a virtual private community, the communication device including an interface to receive a unique virtual community identifier indicating a hierarchical structure of the virtual private community acquired from another communication device included in the virtual private community, a processor to generate a hierarchical content name including a virtual community identifier of the virtual private community and a content name included in the communication device, and a memory to store the virtual community identifier and the hierarchical content name.
  • the processor may comprise a security key generation module to generate a public key for the virtual private community, and to generate a security key of the virtual private community based on the public key, and an association module to perform a self-secure association with another communication device of the virtual private community using the security key.
  • the security key generation module may provide the public key or the security key to another communication device of another virtual private community that requests association with the communication device.
  • the association module may perform association with the other communication device of the other virtual private community using the public key or the security key.
  • a communication device communicating in a network of virtual private communities, wherein the virtual private communities comprises a first virtual private community and a second virtual private community including the first virtual private community as a member, the communication device including an interface to receive a hierarchical content name comprising virtual community identifiers indicating hierarchical structures of the first and second virtual private communities, a processor to process a content request received from the another communication device using the hierarchical content name, and a memory to store the virtual community identifiers.
  • the processor may comprise an association module to perform association with a communication device that has the content, using the virtual community identifiers of the first and the second virtual private communities.
  • the processor may comprise a routing module to generate a routing path between the communication device that has the content and the another communication device that requests the content, using the virtual community identifiers of the first and the second virtual private communities.
  • the communication device may further comprise a monitoring module to detect a change in contents included in members of the second virtual private community, wherein the processor acquires the changed content from the members of the second virtual private community.
  • the processor may perform at least one of a synchronization, a push, and a content search, with members of the second virtual private community.
  • the processor may manage information about members of the second virtual private community, and information about contents included in the members of the second virtual private community.
  • the interface may transmit, to members of the second virtual private community, a public key to recognize the communication device as a hub.
  • the interface may exchange communication environment information with other virtual private communities that are outside of the second virtual private community to perform communication with the other virtual private communities.
  • the communication environment information may comprise information about virtual community identifiers and contents included in members of the second and other virtual private communities.
  • a device for a virtual private network configured in a user-oriented manner independent of a service provider, and which allows devices of the virtual private network to share content
  • the device including an interface configured to perform a server-less association with a second device to generate a first virtual private community included in the virtual private network, such that the first virtual private community includes at least the device and the second device, and a processor to generate content for sharing with other devices included in the first virtual private community.
  • the interface may receive a virtual community identifier from the second device that indicates a hierarchical structure of the first virtual private community, and the processor may use the virtual community identifier and content name to generate the content for sharing with the other devices included in the virtual private group.
  • the virtual private network may include a hierarchical community that includes the first virtual private community and a second virtual private community that encompasses the first virtual private group and that has a higher level of hierarchy in comparison to the first virtual private community.
  • the second virtual private community may comprise a plurality of first virtual private communities.
  • the virtual private network may include a third virtual private community that encompasses the second virtual private community and that has a higher level of hierarchy in comparison to the first and second virtual private communities.
  • the interface may receive a request from the second device requesting to join the first virtual private community, and the interface may transmit a security key to the second device to perform the server-less association with the second device.
  • the interface may transmit a request to the second device requesting to join the first virtual private community, and the interface may receive a security key from the second device to perform the server-less association with the second device to join the first virtual private community.
  • the first virtual private community may include the second device and a plurality of other devices, and in response to performing association with the second device, the device may also become associated with the plurality of other devices.
  • the device may be a hub that forms the first virtual private community, performs member management corresponding to devices that are members of the first virtual private community, and performs content management of the members.
  • FIG. 1 illustrates an example network that includes user-oriented virtual private communities.
  • the network of the user-oriented virtual private communities may include various virtual private communities, for example, one or more first virtual private communities, a plurality of second virtual private communities 110, 130, and 150, a third virtual private community 170, a mobile operator 180, and the Internet 190.
  • the user-oriented virtual private community may correspond to a virtual community that generates and transmits a content request message that expresses an interest of a user as content to acquire the content requested by the user in the virtual private community.
  • the user-oriented virtual private community may enable various services to be shared between acquaintances by supporting the generation of a virtual private community. For example, a relationship between family members and relatives formed offline may be maintained online.
  • the virtual private community may be an online community generated in a user-oriented manner.
  • the virtual private community is not limited by a boundary of an infrastructure, and may provide a service regardless of a boundary.
  • the virtual private community may include various types of hierarchical or non-hierarchical communities. In this example, the "non-hierarchical communities" may indicate horizontal communities.
  • the user-oriented virtual private community may provide a more effective sharing and social networking service in a user-friendly manner while at the same time preventing personal information from being exposed.
  • Information may be shared only between the users or members of the virtual private community. Accordingly, the personal information of the users or members of the virtual private community may be prevented from being inadvertently leaked by a service provider or through the hacking of an external server.
  • the virtual private community may be a virtual community configured in a user-oriented manner that is independent of a service provider, and may be generated in a form of distributed structure.
  • the virtual private community may be classified into a first virtual private community, second virtual private communities 110, 130, and 150, third virtual private community 170, and the like, based on the size and characteristic of the community.
  • the first virtual private community may be a first-level elementary community and may include one or more communication devices.
  • the communication devices included in the first virtual private community may be for multiple users or a single user.
  • the first virtual private community may include multiple users that each has one or more communication devices or a single user that has one or more communication devices.
  • the first virtual private community may be identified as the user.
  • the single user may have a single communication device, instead of multiple devices.
  • the first virtual private community includes only a single communication device.
  • the communication devices included in the first virtual private community may perform a server-less and self-secure association between them. Through self-secure association, the communication devices may securely communicate via an encrypted link that established directly between them without the use of a third party. Referring to FIG. 1 , one or more of the communication devices 113, 115, and 117 belonging to multiple users or a single user may configure the first virtual private community.
  • the communication device may be a terminal, for example, a computer, a mobile terminal, a smart phone, a MP3 player, a personal digital assistant (PDA), a tablet, a sensor, an intelligent mobile device (IMD), and the like.
  • the communication device may be wireless or wired devices that include a networking function.
  • the sensor device may be combined with a more advanced security technology and may be applied to an e-health system and/or a smart home.
  • the first virtual private community may include at least one communication device for a single user.
  • a communication device 111 may be a computer that belongs to a father
  • the communication device 113 may be a mobile device that belongs to the father
  • the communication device 115 may be a PDA that belongs to a mother
  • the communication device 117 may be a mobile device that belongs to the mother.
  • the first virtual private community may be generated to include communication device 111 and the communication device 113 for the father, and another first virtual private community may be generated to include communication device 115 and the communication device 117 for the mother.
  • the communication device 111 and the communication device 113 for the father included in the first virtual private community may perform a self-secure association between them.
  • the communication device 115 and the communication device 117 for the mother in the other first virtual private community may also perform a self-secure association between them.
  • the plurality of second virtual private communities 110, 130, and 150 may correspond to a higher level community in comparison to the first virtual private communities, and may share a content sharing service and/or a social networking service.
  • the second virtual private community 110 may include a hub 111 and the communication devices 113, 115, and 117. Also, the second virtual private community 130 may include a hub 131 and communication devices 133 and 135, and the second virtual private community 150 may include a hub 151 and communication devices 153 and 155.
  • the communication devices 111, 131, and 151 that are in the parents' home, my home, and the sister's home, may respectively belong to a first virtual private community, and may operate as a hub of a second virtual private community. Further descriptions thereof are made hereinafter.
  • the second virtual private communities 110, 130, and 150 may have a size that corresponds to a home unit such as, parents' home, my home, and sister's home as illustrated in FIG. 1 .
  • a home unit community is presented merely as an example and it should be appreciated that the size of the second virtual private communities 110, 130, and 150 is not limited to a home unit.
  • the second virtual private communities 110, 130, and 150 may include a predetermined user of the first virtual private community as a member and users authorized by the predetermined user as members.
  • the father and mother that each has at least one communication device may be the members of the second virtual private community.
  • the user may own a laptop computer 131 that acts as the hub and a smart phone 133, and a spouse of the user may own a smart phone 135.
  • my laptop 131 and smart phone 133 may be members of the first virtual private community
  • my spouse's smart phone 135 may be a member of another first virtual private community.
  • the user and the spouse may be considered as members of the second virtual private community.
  • the user's spouse may be a user that is an authorized member of the second virtual private community by the user.
  • the third virtual private community 170 may be a highest level community generated by mutual association of second virtual private communities 110, 130, and 150, and may have a size that corresponds to "my world" as illustrated in the example of FIG. 1 .
  • the third virtual private community 170 may include the second virtual private communities 110, 130, and 150 as members.
  • the members of the third virtual private community 170 may perform an association through the hubs 111, 131, and 151.
  • information about each of the second virtual private communities corresponding to the members of the third virtual private community 170 may be exchanged and shared through the hubs 111, 131, and 151.
  • the information about the second virtual private communities may include information about members of the second virtual private community and information about a content included in the members of the second virtual private community.
  • the virtual private community may be easily extended to a wider hierarchical or non-hierarchical virtual private community such as a fourth virtual private community, a fifth virtual private community, and the like, for example, based on a desire of the user to extend the community size.
  • FIG. 2 illustrates an example of a method for generating a user-oriented virtual private community.
  • a first virtual private community for a predetermined user is generated.
  • the user may include one or more communication devices.
  • the at least one communication device may generate a hierarchical content name using a virtual community identifier of the first virtual private community and a content name included in the at least one communication device.
  • the hierarchical content name may hierarchically include the virtual community identifier of the first virtual private community and the content name included in the at least one communication device.
  • the virtual community identifier of the first virtual private community may correspond to "Jones”
  • the first virtual private community may include a cell phone, a laptop computer, and a PDA
  • the cell phone may include content "abc.mpeg”.
  • the cell phone included in the first virtual private community may generate the hierarchical content name "Jones/cellphone/abc.mpeg” using the virtual community identifier "Jones" of the first virtual private community and the content name "abc.mpeg" included in the cell phone.
  • the hierarchical content name may be "Jones/abc.mpeg”. That is, the name of the communication device may or may not be included in the hierarchical content name.
  • a communication device included in each virtual private community may generate the virtual community identifier using community information, member information, and the like, and may generate the hierarchical content name using the virtual community identifier and the content name.
  • the information may correspond to a name.
  • a second virtual private community is generated as a higher level community in comparison to the first virtual private community.
  • Members of the second virtual private community may share a content sharing service and/or social networking service.
  • the second virtual private community may include a predetermined user and members corresponding to users that are authorized by the predetermined user.
  • a third virtual private community is generated as a higher level community in comparison to the first and second virtual private communities.
  • Members of the third virtual private community may perform an association through a predetermined communication device or hub, and may share information about the second virtual private communities.
  • Each of the first virtual private community, the second virtual private community, and the third virtual private community may have a unique virtual community identifier that indicates a hierarchical structure.
  • a communication device may generate the hierarchical content name using the content name and the virtual community identifier of each of the first virtual private community, the second virtual private community, and the third virtual private community.
  • a communication device may generate content, and it may also generate a hierarchical content name including the community information and the content name. For example, if a communication device belongs to a first virtual private community corresponding to a user member and the member belongs to a second virtual private community, the hierarchical content name may be "(second virtual private) community name/member name/content name" or "(second virtual private) community name/member name/name of the communication device/content name”.
  • the community name, member name, and content name that are expressed for the hierarchical content name may have the form of, for example, "parents' home/Jones (father's name)/abc.txt".
  • the hierarchical structure indicated by the hierarchical content name may be used for configuring a transmission path of a content request message.
  • the virtual private community may be expressed as an intuitive and user-friendly virtual community identifier such as "my home” or "my world" of FIG. 1 , and the members of each virtual private community may have a unique virtual community identifier that indicates the hierarchical structure.
  • each virtual private community may more easily generate a routing path of the content request message and the transmission path of the content.
  • the virtual private community may exchange information about the virtual private community together with the virtual community identifier of each virtual private community.
  • the information about the virtual private community may include, for example, information about the members of the virtual private community, a content list, and the like.
  • a member may generate content, and may also generate the hierarchical content name including the community information.
  • the hierarchical content name may include community information, member information, and content information such as "community name/member name/content name" or "community name/member name/name of the communication device/content name”.
  • the hierarchical content name may be expressed as, for example, alice_world/alice_home/alice/wild.jpg or alice_world/alice_home/alice/cellphone/wild.jpg, and the like.
  • the name "alice_world” may correspond to a name of a highest level virtual private community (for example, a third virtual private community)
  • the name “alice_home” may correspond to a name of a second highest level virtual private community (for example, a second virtual private community)
  • the name "alice” may correspond to a name of an elementary unit virtual private community (for example, a first virtual private community)
  • “cellphone” may correspond to a communication device that belongs to "alice”
  • "wild.jpg” may correspond to a content name included in the elementary unit virtual private community or communication device.
  • a communication device generates a public key for each of the first virtual private community, the second virtual private community, and the third virtual private community.
  • a communication device generates a security key for each of the first virtual private community, the second virtual private community, and the third virtual private community, based on the public key generated in 240.
  • the members or the communication devices included in the first virtual private community, the second virtual private community, and the third virtual private community perform a self-secure association between them using the security key.
  • a new member or a new communication device that joins one of the first virtual private community, the second virtual private community, and the third virtual private community may perform an association with a single member from among members of the first virtual private community, the second virtual private community, and the third virtual private community.
  • the association may be performed using a credential of each of the first virtual private community, the second virtual private community, and the third virtual private community.
  • FIG. 3 illustrates an example of a member of a virtual private community and a member of another virtual private community configuring a new virtual private community.
  • a network of user-oriented virtual private communities includes a plurality of second virtual private communities (A, B, and C) 310, 330, and 350, a third virtual private community 370, a mobile operator 380, and the Internet 390.
  • the second virtual private community (A) 310 includes a hub 311 and communication devices 313, 315, and 317.
  • the second virtual private community (B) 330 includes a hub 331 and communication devices 333 and 335.
  • the second virtual private community (C) 350 includes a hub 351 and communication devices 353 and 355.
  • communication devices 313 and 315 originally belong to second virtual private community (A) 310 and (B) 330, respectively.
  • the communication device 313 and the communication device 335 may perform an association with each other beyond the hierarchical boundary of the second virtual private community (A) 310 and the second virtual private community (B) 330 to generate another virtual private community, for example, a fourth virtual private community 320.
  • a user using the communication device 313 belonging to the second virtual private community (A) 310 may generate a new fourth virtual private community 320 with another user using the communication device 335 of the second virtual private community (B) 330.
  • the new fourth virtual private community 320 may correspond to a non-hierarchical virtual private community that is not subjected to a boundary of the already configured second virtual private communities or third virtual private community.
  • Members of the new fourth virtual private community 320 may generate and exchange a public key.
  • the members may also generate a security key using the public key for the new fourth virtual private community 320.
  • New virtual private communities 320 and 340 of FIG. 3 that are independent of the existing hierarchical second virtual private communities may provide a predetermined access control and security setting that conform to a characteristic of the newly generated virtual private communities.
  • the new fourth virtual private community 320 or 340 may provide a limited access control and security setting only for itself.
  • the communication device 333 may belong to a son of "my home”
  • the communication device 355 may belong to a son of my sister, that is, the nephew of "my sister's home”.
  • the son of the user and the son of the user's sister may desire to share confidential information that they desire to keep from other family members, and may configure a new virtual private community that is different from the existing hierarchical second virtual private communities.
  • the new virtual private community may maintain security and allow access to its members only, and may prevent other members from accessing the new virtual private community using a new public key and a new security key.
  • the new virtual private community may be beyond the boundary of the highest level virtual private community, which in the example of FIG. 3 is the third virtual private community 370.
  • the new virtual private community may be generated in the form of a hierarchical community, instead of a non-hierarchical community.
  • a security key management technology that is based on a dispersion structure may be used to configure various forms of a community.
  • the security key described herein may be generated using the public key for each virtual private community and may be referenced for the security key management technology based on the dispersion structure.
  • FIG. 4 illustrates an example of a method of a communication device in a virtual private community.
  • a communication device may acquire a virtual community identifier of a first virtual private community from another communication device that is included in the first virtual private community, and may generate a hierarchical content name using the virtual community identifier and a content name included in the communication device.
  • the communication device may generate the virtual community identifier.
  • the first virtual private community may correspond to a predetermined user that has one or more communication devices.
  • the hierarchical content name may hierarchically include the virtual community identifier of the first virtual private community and the content name.
  • the communication device may generate a public key for the first virtual private community, and may generate a security key of the first virtual private community based on the public key.
  • the communication device may perform a self-secure association with another communication device of the first virtual private community, using the security key.
  • An example of a self-secure association performed by the communication device with another communication device is further described with reference to FIG. 5 .
  • the virtual private community may further include a second virtual private community that is a higher level community in comparison to the first virtual private community.
  • the virtual private community may include a third virtual private community that is a higher level community in comparison to the first and second virtual private communities.
  • Members of the second virtual private community may share a content sharing service and/or social networking service.
  • Members of the third virtual private community may perform an association through a predetermined communication device and may share information about the second virtual private communities.
  • a communication device may generate or acquire the virtual community identifiers of the first and second virtual private communities from another communication device that are included in each of the first and second virtual private communities. Thereafter, the communication device may generate the hierarchical content name using the content name and the virtual community identifier of each of the first and second virtual private communities.
  • the hierarchical content name may hierarchically include the content name and the virtual community identifier of each of the first and second virtual private communities.
  • a communication device may generate or acquire the virtual community identifiers of the first, second, and third virtual private communities from another communication device that is included in each of the first, second, and third virtual private communities, and may generate the hierarchical content name using the content name and the virtual community identifier of each of the first, second, and third virtual private communities.
  • the hierarchical content name may hierarchically include the virtual community identifier of each of the first, second, and third virtual private communities.
  • a communication device generates a virtual community identifier of the first virtual private community.
  • the first virtual private community may correspond to a predetermined user
  • the second virtual private community may be a higher level community than that of the first virtual private community
  • the third virtual private community may be a higher level community than that of the second virtual private community and the first virtual private community.
  • the first virtual private community may include, as a member, one or more communication devices of the predetermined user.
  • the members of the second virtual private community may share a content sharing service and/or social networking service.
  • the members of the third virtual private community may perform the association through a predetermined communication device, and may share information about the second virtual private communities.
  • the communication device acquires the virtual community identifier of each of the second virtual private community and the third virtual private community from another communication device that belongs to both of the second virtual private community and the third virtual private community.
  • operations 410 and 420 illustrate an example in which a communication device generates a virtual community identifier of the first virtual private community itself and acquires the virtual community identifiers of the second and third virtual private communities from another communication device.
  • the communication device may generate each of the virtual community identifiers itself or may acquire one or more of the virtual community identifiers from one or more other communication devices.
  • the communication device generates a hierarchical content name using a content name and the virtual community identifier of each of the first, second, and third virtual private communities.
  • the hierarchical content name may be used to hierarchically indicate the virtual community identifier of each of the first, second, and third virtual private communities.
  • the communication device In 440, the communication device generates a public key for the first virtual private community. Thereafter, in 450, the communication device generates a security key of the first virtual private community, based on the public key.
  • the communication device performs self-secure association with another communication device of the first virtual private community, using the security key.
  • the communication device determines whether a single member requesting association with the communication device, from among the members of the second and third virtual private communities, includes the public key and the security key for the first virtual private community. If the single member requesting association with the communication device includes the above-mentioned public key and security key, in 490 the communication device performs association with the single member using the public key and the security key.
  • the communication device may enable the association to be performed in 490 by providing, to the single member, the public key or the security key of the first virtual private community, in 480.
  • FIG. 5 illustrates an example of a self-secure association.
  • a communication device when a communication device newly joins a virtual private community, it may not need to perform association with all of the members of the virtual private community.
  • a communication device 540 that newly joins the virtual private community may perform association with a single member in the virtual private community.
  • the communication device 540 may be automatically associated with all members in the virtual private community.
  • the automatically performed association may be referred to as an auto and scalable association.
  • a communication device of an inviter (hereinafter, 'owner') configuring a virtual private community for the first time may generate a public key for the virtual private community to which the owner belongs.
  • a communication device 510 may be an owner of a second virtual private community, and communication devices 520 and 530 may correspond to other members of the second virtual private community.
  • the owner 510 may share a public key with the communication devices 520 and 530 such that members of the second virtual private community may recognize the owner 510. To share the public key for recognizing the owner 510, the owner 510 may transmit the public key to the communication devices 520 and 530 via an authorized channel.
  • the communication devices 520 and 530 may verify whether the information transferred to them is transferred from a proper owner (for example, the owner 510 of the second virtual private community to which the communication devices 520 and 530 belong in FIG. 5 ) using the public key. For example, the communication devices 520 and 530 may verify whether a signature of the corresponding information belongs to the owner 510, using the public key. By sharing the public key of the owner 510 with the communication devices 520 and 530, they may be verified as members of the virtual private community.
  • a proper owner for example, the owner 510 of the second virtual private community to which the communication devices 520 and 530 belong in FIG. 5
  • the communication devices 520 and 530 may verify whether a signature of the corresponding information belongs to the owner 510, using the public key.
  • Each of the members of a predetermined virtual private community may be linked with the owner 510 through the public key.
  • a member corresponding to the communication device 540 that newly joins the virtual private community may perform association with the owner 510 once, and be automatically associated with other members corresponding to the communication devices 520 and 530 in the virtual private community.
  • the member corresponding to the communication device 540 newly joining the virtual private community may perform association with the owner 510 once, and be automatically associated with the other members corresponding to the communication devices 520 and 530 in the same virtual private community without performing associations with each respective member.
  • the communication device 540 may perform association with another member such as the communication devices 520 and 530 in the virtual private community.
  • the communication devices 520 and 530 in the virtual private community may be linked to a credential of the owner 510, and thus, a communication device may be associated with the owner 510 without directly performing association with the owner 510.
  • the owner 510 and the communication devices 520 and 530 in the virtual private community may provide information about the members of the virtual private community to each other.
  • the information may include the hierarchical content name, the virtual community identifier, and the like, included in themselves.
  • the information may be used for an automatic association between an owner and other members, and a content routing between virtual private communities.
  • FIG. 6 illustrates an example of a method of a hub for a virtual private community.
  • the hub in the virtual private community acquires a virtual community identifier of each of a first virtual private community and a second virtual private community.
  • the virtual private community may include the first virtual private community for a predetermined user that has at least one communication device and the second virtual private community as a higher level community in comparison to the first virtual private community.
  • Members of the second virtual private community may share a content sharing service and/or social networking service.
  • the hub may form the virtual private community, may perform member management, may perform content management of a member, and the like.
  • the hub may transmit the public key to the members of the second virtual private community to enable the members to recognize the hub. For example, the hub may transmit the public key via an authorized channel.
  • the hub may correspond to a predetermined communication device in the virtual private community as opposed to a separate device.
  • the hub may generally be connected to a broadband convergence network, and may correspond to a communication device that is constantly operating on an on state.
  • the members that belong to the virtual private community may communicate with an external source through the hub as the center, or may communicate with the external source directly instead of relying on the hub.
  • the hub may generate the virtual private communities as well as the virtual community identifiers.
  • the hub In 620, the hub generates a routing path between a communication device that has the content and a communication device that requests the content, using community information that is included in the virtual community identifier.
  • the hub may perform the role of a router in the virtual private community and a communication device may more easily exchange routing information, and the like, through the hub.
  • the hub may perform tunneling so that members of second virtual private community may communicate with members of other second virtual private communities.
  • the hub may provide a tunnel between members of a virtual private community and a communication device outside of a local connection area of the virtual private community to which the communication device belongs and thereby configure a communication environment.
  • the hub may form the virtual private community, may perform member management, may perform content management of the member, and the like.
  • the hub processes a content request message that is received from a communication device or members included in each virtual private community, using the virtual community identifiers of virtual private communities. For example, the hub may process the content request message using the routing path generated in operation 620.
  • the hub periodically or aperiodically detects a change in the content included in the members of the second virtual private community.
  • the hub In response to the change in the content included in the members of the second virtual private community being detected, in 650, the hub acquires the changed content, or causes the members of the second virtual private community to share the changed content, in 660.
  • the hub may manage information about members of the second virtual private community, and information about the content included in the members of the second virtual private community.
  • the hub may exchange communication environment information with other virtual private communities that are outside of the second virtual private community to perform a communication.
  • the communication environment information may include information about a name of the virtual private community, the virtual community identifier, the content included in the virtual private community, and the like.
  • the hub may perform at least one of a synchronization, a push, and a content search, with the members of the second virtual private community.
  • the virtual private community may further include a third virtual private community as a higher level community than that of the second virtual private community.
  • members of the third virtual private community may perform association through a predetermined communication device, and may share information about the second virtual private communities.
  • the hub may acquire the virtual community identifiers of the first, second, and third virtual private communities, and the hub may process a content request received from a communication device and/or received from members included in each virtual private community using the virtual community identifier of each of the first, second, and third virtual private communities.
  • the hub may perform association with a communication device that has the content using the virtual private identifier of each of the first, second, and third virtual private communities.
  • the hub may generate the routing path between a communication device that has the content and a communication device that requests the content, using the virtual community identifier of each of the first, second, and third virtual private communities.
  • a virtual private community network may include one or more communication devices and at least one hub.
  • a communication device in the network may generate a hierarchical content name using a content name and a virtual community identifier that indicates a hierarchical structure of first, second, and third virtual private communities.
  • the hub may process the content request received from a communication device using the hierarchical content name.
  • FIG. 7 illustrates an example of a communication device for a virtual private community.
  • communication device 700 communicating in the virtual private community includes an interface 710, a processor 730, and a memory 750.
  • the virtual private community may include a first virtual private community for a predetermined user that owns one or more communication devices.
  • the interface 710 may receive a unique virtual community identifier indicating a hierarchical structure of the first virtual private community from a communication device that is included in the first virtual private community.
  • the processor 730 may generate a hierarchical content name using the virtual community identifier of the first virtual private community and a content name included in the communication device.
  • the memory 750 may store the virtual community identifier and the hierarchical content name.
  • the virtual private community may further include a second virtual private community that is a higher level community in comparison to the first virtual private community.
  • members of the second virtual private community may share a content sharing service and/or social networking service.
  • the interface 710 may receive the unique virtual community identifier indicating the hierarchical structure of each virtual private community from a communication device that is included in the first and second virtual private communities.
  • the processor 730 may generate a hierarchical content name using the virtual community identifier of each of the first and second virtual private communities, and the content name included in the communication device included in the first and second virtual private communities.
  • the processor 730 may generate the virtual community identifier of each of the first virtual private community and the second virtual private community.
  • the hierarchical content name may hierarchically include the virtual community identifier of each of the first and second virtual private communities, and the content name.
  • the processor 730 includes a security key generation module 732 and an association module 734.
  • the security key generation module 732 may generate a public key for the first virtual private community, and generate a security key of the first virtual private community based on the public key. If the communication device is a communication device of a member that belongs to the first virtual private community, the second virtual private community, or the third virtual private community, the communication device may generate the public key and the security key for the corresponding virtual private community.
  • the security key generation module 732 may provide the public key or the security key to a single member of a virtual private community that requests association with the communication device.
  • the association module 734 may perform a self-secure association with the single member using the security key.
  • the single member that performs association with the communication device may automatically be associated with the other members of the virtual private community including the communication device, and thus, the member may not need to further perform the association.
  • the memory 750 may store the virtual community identifier and hierarchical content name. Because the memory 750 may store the public key and the security key generated in the security key generation module 732, the processor 730 may provide the stored the public key and the security key to the single member requesting the association with the communication device.
  • FIG. 8 illustrates an example of a hub for a virtual private community.
  • the hub 800 includes an interface 810, a processor 830, and a memory 850.
  • the hub 800 may further include a monitoring module 870.
  • the virtual private community may include a first virtual private community for a predetermined user that has one or more communication devices, and a second virtual private community that is a higher level community in comparison to the first virtual private community.
  • members of the second virtual private community may share a content sharing service and/or social networking service.
  • the interface 810 may receive a unique virtual community identifier indicating a hierarchical structure of each virtual private community from a communication device included in the first and second virtual private communities.
  • the interface 810 may transmit a public key to members of the second virtual private community via an authorized channel.
  • the public key enables the members to recognize the hub 800.
  • the interface 810 may exchange communication environment information with other virtual private communities that are outside of the second virtual private community to communicate with them.
  • the communication environment information may include information about a virtual community identifier and a content included in the member of the virtual private community.
  • the processor 830 may process a content request received from a communication device, using the hierarchical content name.
  • the processor 830 includes an association module 832 and a routing module 834.
  • the association module 832 may perform an association with a communication device that has the content, using the virtual community identifier of each of the first and second virtual private communities.
  • the routing module 834 may generate a routing path between the communication device that has the content and the communication device that requests the content, using the virtual community identifier.
  • the processor 830 may perform at least one of a synchronization, a push, and a content search, with the members of the second virtual private community. For example, the processor 830 may manage information about the members of the second virtual private community, and information about the content included in the members of the second virtual private community.
  • the memory 850 may store the virtual community identifier.
  • the monitoring module 870 may periodically or aperiodically detect a change in content that is included in the members of the second virtual private community. If the change in the content is detected by the monitoring module 870, the processor 830 may acquire the changed content from the members of the second virtual private community, or cause the members of the second virtual private community to share the changed content. In various examples, the monitoring module 870 may be included in the processor 830.
  • Program instructions to perform a method described herein, or one or more operations thereof, may be recorded, stored, or fixed in one or more computer-readable storage media.
  • the program instructions may be implemented by a computer.
  • the computer may cause a processor to execute the program instructions.
  • the media may include, alone or in combination with the program instructions, data files, data structures, and the like.
  • Examples of computer-readable storage media include magnetic media, such as hard disks, floppy disks, and magnetic tape; optical media such as CD ROM disks and DVDs; magneto-optical media, such as optical disks; and hardware devices that are specially configured to store and perform program instructions, such as read-only memory (ROM), random access memory (RAM), flash memory, and the like.
  • Examples of program instructions include machine code, such as produced by a compiler, and files containing higher level code that may be executed by the computer using an interpreter.
  • the program instructions that is, software
  • the program instructions may be distributed over network coupled computer systems so that the software is stored and executed in a distributed fashion.
  • the software and data may be stored by one or more computer readable storage mediums.
  • functional programs, codes, and code segments for accomplishing the example embodiments disclosed herein can be easily construed by programmers skilled in the art to which the embodiments pertain based on and using the flow diagrams and block diagrams of the figures and their corresponding descriptions as provided herein.
  • the described unit to perform an operation or a method may be hardware, software, or some combination of hardware and software.
  • the unit may be a software package running on a computer or the computer on which that software is running.
  • a terminal/communication device/unit described herein may refer to mobile devices such as a cellular phone, a personal digital assistant (PDA), a digital camera, a portable game console, and an MP3 player, a portable/personal multimedia player (PMP), a handheld e-book, a portable lab-top PC, a global positioning system (GPS) navigation, and devices such as a desktop PC, a high definition television (HDTV), an optical disc player, a setup box, and the like capable of wireless communication or network communication consistent with that disclosed herein.
  • mobile devices such as a cellular phone, a personal digital assistant (PDA), a digital camera, a portable game console, and an MP3 player, a portable/personal multimedia player (PMP), a handheld e-book, a portable lab-top PC, a global positioning system (GPS) navigation, and devices such as a desktop PC, a high definition television (HDTV), an optical disc player, a setup box, and the like capable of wireless communication or network communication consistent with that disclosed herein.
  • a computing system or a computer may include a microprocessor that is electrically connected with a bus, a user interface, and a memory controller. It may further include a flash memory device.
  • the flash memory device may store N-bit data via the memory controller. The N-bit data is processed or will be processed by the microprocessor and N may be 1 or an integer greater than 1.
  • a battery may be additionally provided to supply operation voltage of the computing system or computer.
  • the computing system or computer may further include an application chipset, a camera image processor (CIS), a mobile Dynamic Random Access Memory (DRAM), and the like.
  • the memory controller and the flash memory device may constitute a solid state drive/disk (SSD) that uses a non-volatile memory to store data.
  • SSD solid state drive/disk

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Strategic Management (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Human Resources & Organizations (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Quality & Reliability (AREA)
  • Tourism & Hospitality (AREA)
  • Data Mining & Analysis (AREA)
  • General Business, Economics & Management (AREA)
  • Operations Research (AREA)
  • Economics (AREA)
  • Physics & Mathematics (AREA)
  • Marketing (AREA)
  • Computer Security & Cryptography (AREA)
  • Information Transfer Between Computers (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Small-Scale Networks (AREA)
  • Telephonic Communication Services (AREA)
EP18152361.4A 2010-07-06 2011-07-04 Verfahren zur erzeugung einer virtuellen privaten gemeinschaft und netzwerk unter verwendung der virtuellen privaten gemeinschaft Ceased EP3346435A1 (de)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
KR1020100064705A KR101631618B1 (ko) 2010-07-06 2010-07-06 가상 개인화 그룹 생성 방법 및 가상 개인화 그룹을 이용하는 통신 기기와 허브를 포함하는 네트워크
EP20110172523 EP2405388A1 (de) 2010-07-06 2011-07-04 Verfahren zur Erzeugung einer virtuellen privaten Gemeinschaft und Netzwerk, das die virtuelle private Gemeinschaft verwendet

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
EP20110172523 Division EP2405388A1 (de) 2010-07-06 2011-07-04 Verfahren zur Erzeugung einer virtuellen privaten Gemeinschaft und Netzwerk, das die virtuelle private Gemeinschaft verwendet

Publications (1)

Publication Number Publication Date
EP3346435A1 true EP3346435A1 (de) 2018-07-11

Family

ID=44774210

Family Applications (2)

Application Number Title Priority Date Filing Date
EP20110172523 Withdrawn EP2405388A1 (de) 2010-07-06 2011-07-04 Verfahren zur Erzeugung einer virtuellen privaten Gemeinschaft und Netzwerk, das die virtuelle private Gemeinschaft verwendet
EP18152361.4A Ceased EP3346435A1 (de) 2010-07-06 2011-07-04 Verfahren zur erzeugung einer virtuellen privaten gemeinschaft und netzwerk unter verwendung der virtuellen privaten gemeinschaft

Family Applications Before (1)

Application Number Title Priority Date Filing Date
EP20110172523 Withdrawn EP2405388A1 (de) 2010-07-06 2011-07-04 Verfahren zur Erzeugung einer virtuellen privaten Gemeinschaft und Netzwerk, das die virtuelle private Gemeinschaft verwendet

Country Status (4)

Country Link
US (1) US9113319B2 (de)
EP (2) EP2405388A1 (de)
JP (1) JP5986356B2 (de)
KR (1) KR101631618B1 (de)

Families Citing this family (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8353640B2 (en) 2008-01-22 2013-01-15 Brock Usa, Llc Load supporting panel having impact absorbing structure
US9009258B2 (en) 2012-03-06 2015-04-14 Google Inc. Providing content to a user across multiple devices
US8966043B2 (en) 2012-04-27 2015-02-24 Google Inc. Frequency capping of content across multiple devices
US9514446B1 (en) 2012-04-27 2016-12-06 Google Inc. Remarketing content to a user associated with multiple devices
US9881301B2 (en) 2012-04-27 2018-01-30 Google Llc Conversion tracking of a user across multiple devices
US9258279B1 (en) 2012-04-27 2016-02-09 Google Inc. Bookmarking content for users associated with multiple devices
US8688984B2 (en) * 2012-04-27 2014-04-01 Google Inc. Providing content to a user across multiple devices
US8892685B1 (en) 2012-04-27 2014-11-18 Google Inc. Quality score of content for a user associated with multiple devices
US8978158B2 (en) 2012-04-27 2015-03-10 Google Inc. Privacy management across multiple devices
CN104704797B (zh) * 2012-08-10 2018-08-10 纽昂斯通讯公司 用于电子设备的虚拟代理通信
US9954763B1 (en) * 2014-02-27 2018-04-24 Amazon Technologies, Inc. Pre-configured virtual gateways for isolated virtual networks
US9641488B2 (en) 2014-02-28 2017-05-02 Dropbox, Inc. Advanced security protocol for broadcasting and synchronizing shared folders over local area network
US10460098B1 (en) 2014-08-20 2019-10-29 Google Llc Linking devices using encrypted account identifiers
WO2017131695A1 (en) * 2016-01-28 2017-08-03 Hewlett Packard Enterprise Development Lp Private sharing communities
US9942787B1 (en) 2016-03-22 2018-04-10 Amazon Technologies, Inc. Virtual private network connection quality analysis
CN107222394B (zh) * 2017-06-16 2020-07-17 深圳量子云科技有限公司 一种社交网络的用户访问控制方法及系统

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050028012A1 (en) * 2003-07-31 2005-02-03 Fujitsu Limited Network node machine and information network system
US20070250700A1 (en) * 2006-04-21 2007-10-25 Microsoft Corporation Peer-to-peer contact exchange
US20070271234A1 (en) * 2006-05-22 2007-11-22 Ravikiran Chickmangalore N Information Exchange Among Members of a Group of Communication Device Users
US20080080392A1 (en) * 2006-09-29 2008-04-03 Qurio Holdings, Inc. Virtual peer for a content sharing system
US20080144625A1 (en) * 2006-12-14 2008-06-19 Array Networks, Inc. Dynamic system and method for virtual private network (VPN) application level content routing using dual-proxy method
WO2009127904A1 (en) * 2008-04-16 2009-10-22 Quipa Holdings Limited A private network system and method
KR20100064705A (ko) 2008-12-05 2010-06-15 주식회사 한경희생활과학 시즈 히터 조립체 및 이를 이용한 저수식 스팀 보일러
US20100161974A1 (en) * 2008-12-19 2010-06-24 Jooyoung Lee Master terminal capable of registering and managing terminals of personal use scope, and method and system using the same

Family Cites Families (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4675631B2 (ja) * 2005-01-11 2011-04-27 Kddi株式会社 インデックスサーバ及びp2pネットワークシステム
JP4604830B2 (ja) * 2005-05-16 2011-01-05 コニカミノルタホールディングス株式会社 情報処理装置、プログラム、情報処理システム、および孤立状態回避方法
JP2008046911A (ja) * 2006-08-17 2008-02-28 Securia Co Ltd 双方向型コミュニケーションサービスにおけるグループ管理システム、及びグループ管理方法。
JP4640307B2 (ja) * 2006-09-29 2011-03-02 ブラザー工業株式会社 コンテンツ配信システム、コンテンツ配信方法、コンテンツ配信システムにおける端末装置及びそのプログラム
AU2007224392B2 (en) * 2006-10-13 2010-09-16 Quipa Holdings Limited A Private Network System And Method
US8140506B2 (en) 2006-11-30 2012-03-20 Red Hat, Inc. File sharing based on social network
KR100860413B1 (ko) 2006-12-04 2008-09-26 한국전자통신연구원 피어 투 피어 네트워크에서 확장홈 서비스 장치 및 서비스제공 방법
KR100953594B1 (ko) 2007-12-18 2010-04-21 한국전자통신연구원 피어 투 피어 기반의 소셜 네트워킹 서비스 방법 및 시스템
US20090215469A1 (en) 2008-02-27 2009-08-27 Amit Fisher Device, System, and Method of Generating Location-Based Social Networks
US20090259485A1 (en) 2008-04-10 2009-10-15 Originator Media, Inc. Method and system for the control of personal identities in virtual networked environments
KR100989371B1 (ko) * 2008-04-29 2010-10-25 이진흥 개인 홈 도메인을 위한 디지털 저작권 관리방법
US8072954B2 (en) 2008-06-16 2011-12-06 Microsoft Corporation Mashup application and service for wireless devices
KR20100062799A (ko) * 2008-12-02 2010-06-10 한국전자통신연구원 홈 커뮤니티간 콘텐츠 공유방법 및 장치

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050028012A1 (en) * 2003-07-31 2005-02-03 Fujitsu Limited Network node machine and information network system
US20070250700A1 (en) * 2006-04-21 2007-10-25 Microsoft Corporation Peer-to-peer contact exchange
US20070271234A1 (en) * 2006-05-22 2007-11-22 Ravikiran Chickmangalore N Information Exchange Among Members of a Group of Communication Device Users
US20080080392A1 (en) * 2006-09-29 2008-04-03 Qurio Holdings, Inc. Virtual peer for a content sharing system
US20080144625A1 (en) * 2006-12-14 2008-06-19 Array Networks, Inc. Dynamic system and method for virtual private network (VPN) application level content routing using dual-proxy method
WO2009127904A1 (en) * 2008-04-16 2009-10-22 Quipa Holdings Limited A private network system and method
KR20100064705A (ko) 2008-12-05 2010-06-15 주식회사 한경희생활과학 시즈 히터 조립체 및 이를 이용한 저수식 스팀 보일러
US20100161974A1 (en) * 2008-12-19 2010-06-24 Jooyoung Lee Master terminal capable of registering and managing terminals of personal use scope, and method and system using the same

Also Published As

Publication number Publication date
KR101631618B1 (ko) 2016-06-27
KR20120004054A (ko) 2012-01-12
JP5986356B2 (ja) 2016-09-06
US20120011363A1 (en) 2012-01-12
JP2012019518A (ja) 2012-01-26
CN102315939A (zh) 2012-01-11
US9113319B2 (en) 2015-08-18
EP2405388A1 (de) 2012-01-11

Similar Documents

Publication Publication Date Title
US9113319B2 (en) Method of generating a virtual private community and network using the virtual private community
US11296937B2 (en) Decentralized data storage and processing for IoT devices
US11818584B2 (en) Two-phase discovery and onboarding of internet of things (IoT) devices
US9178915B1 (en) Cookie preservation when switching devices
US20210120415A1 (en) Providing secure wi-fi in an open wi-fi environment
US20110258303A1 (en) System and method for personal device sharing using social networks
EP3526721A1 (de) Verfahren, vorrichtung und system zur validierung empfindlicher benutzerdatentransaktionen innerhalb eines vertrauenswürdigen kreises
US20170371625A1 (en) Content delivery method
US9559859B2 (en) Home hub
CN106559787B (zh) 网络接入方法、装置及系统
US8984007B2 (en) Method and apparatus using a hierachical searching scheme among virtual private communities
US20160308870A1 (en) Network access method and apparatus
CN111201804A (zh) 启用数据连续性服务的方法
Jain et al. Data Communication and Information Exchange in Distributed IoT Environment: Issues and Their Solutions
US20150242501A1 (en) Social network address book
KR102046730B1 (ko) 서비스 요소들
WO2021163757A1 (en) System and method for implementing a personal virtual data network (pvdn)
EP2706765A1 (de) Verfahren zum Erzeugen und Verwalten einer Vorrichtungsgruppe über ein Verwaltungszentrum
Alwafi et al. A Survey of Mobile Cloud Computing Challenges and Solutions
US9407641B2 (en) Service access control
CN117061115B (zh) 密钥协商方法、装置、计算机设备和计算机可读存储介质
Suthar et al. PMS-Sharing: Framework for Automatically Authenticating users in a Group to Allow Sharing Storage
CN118540303A (zh) 域名解析方法、装置、通信设备、存储介质和产品

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION HAS BEEN PUBLISHED

AC Divisional application: reference to earlier application

Ref document number: 2405388

Country of ref document: EP

Kind code of ref document: P

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: REQUEST FOR EXAMINATION WAS MADE

17P Request for examination filed

Effective date: 20190109

RBV Designated contracting states (corrected)

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: EXAMINATION IS IN PROGRESS

17Q First examination report despatched

Effective date: 20200102

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: EXAMINATION IS IN PROGRESS

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION HAS BEEN REFUSED

18R Application refused

Effective date: 20211008